[2 days left] What’s wrong with your cloud strategy? Learn why multicloud solutions matter with Nimble Storage.Register Now

x
?
Solved

Tcp sequencing and IP fragmentation

Posted on 2004-09-06
6
Medium Priority
?
970 Views
Last Modified: 2013-11-29
I know TCP segments are numbered (with sequence numbers) for reassembly/error recovery reasons.  
How do TCP segments and IP fragmentation correlate?  If the sender has an IP datagram that exceeds the layer 2's MTU, it fragments the datagrams and each datagram gets sent as separate frames across the wire.

Now, what is responsible for reassembly on the other end?   I know that with packet fragmentation, a packet id is defined and the "fragment" flag is turned on.  What is TCP's job in the reassembly of fragged IP datagrams?  Arent the fragmented packets ID'd anyway?
Thanks
0
Comment
Question by:dissolved
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
6 Comments
 
LVL 7

Accepted Solution

by:
LimeSMJ earned 2000 total points
ID: 11991697
The Internet layer (IP protocol) within the TCP/IP architecture is responsible for reassmebly of a fragmented packet.

If a packet hits a network where the MTU is lower than the originator, the packet is fragmented to allow for transmission.  The fragmentation is done usually by the routers along the way so the sender does not know of the packet manipulation (sender won't decrease packet size if MTU is smaller).  Since the sender is only sending sequenced packet numbers (not caring about fragmentation), the fragmented packets need to have their own sequencing flags added in by the router - so that the IP layer can defragment at the receiving end.

TCP's job is provide the transmission link... IP helps negotiate the data packets along the way.




0
 

Author Comment

by:dissolved
ID: 11991843
Cant fragmentation occur between the network layer and data link layer as well?
I heard that if an IP datagram is handed to the data link layer, it will be fragmented if it is to big. And each packet leaving the network will have the fragment flag turned on.

0
 

Author Comment

by:dissolved
ID: 11991850
Also, cant the receiver send a ICMP error back to the sender saying "needs fragmentation" or something like that?
0
Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

 
LVL 7

Expert Comment

by:LimeSMJ
ID: 11992029
The ICMP request for fragmentation is generated by a router if the packet received has the "do not fragment" bit set and cannot be forwarded because the next hop MTU is too small for the packet (fragmenting is not possible to make the MTU smaller, so this error occurs).  The actual destination computer would never send an ICMP request for fragmentation.
0
 
LVL 7

Expert Comment

by:LimeSMJ
ID: 11992101
I am not sure what you meant by :

"...IP datagram is handed to the data link layer, it will be fragmented if it is to big..."

The IP datagram is the packet itself... the sent payload.  If the sending computer knows of potential MTU problems, it may allow the packet to be fragmented (thus preventing any transmission delays).  Unless there is a stack misconfiguration, there is no way for a datagram to be internally fragmented between the OSI layers.
0
 

Author Comment

by:dissolved
ID: 11992105
thanks
0

Featured Post

Nothing ever in the clear!

This technical paper will help you implement VMware’s VM encryption as well as implement Veeam encryption which together will achieve the nothing ever in the clear goal. If a bad guy steals VMs, backups or traffic they get nothing.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, I am going to show you how to simulate a multi-site Lab environment on a single Hyper-V host. I use this method successfully in my own lab to simulate three fully routed global AD Sites on a Windows 10 Hyper-V host.
This month, Experts Exchange’s free Course of the Month is focused on CompTIA IT Fundamentals.
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

656 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question